Search:

Type: Posts; User: Gitsnik; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.01 seconds.

  1. Discussioni: SSH Error

    by Gitsnik
    Replies
    3
    Views
    2,358

    Re: SSH Error

    My experience says it's the ~/.ssh/authorized_keys file, not known_hosts. Try moving it elsewhere or deleting it entirely.
  2. Discussioni: Firewall

    by Gitsnik
    Replies
    3
    Views
    3,363

    Re: Firewall

    iptables is what you are after. There is not a lot going on by default on the backtrack box, it starts with nothing enabled by default so the firewall is effectively useless at that point. If you're...
  3. Discussioni: C++ Compiler

    by Gitsnik
    Replies
    3
    Views
    2,773

    Re: C++ Compiler

    jnpa123 has the answer, use g++ for all C++ compiling in linux distributions.

    Buttt I just wanted to point out that there are approximately 2,780 exploits* on the exploitdb that require...
  4. Discussioni: SQLi - MySQL

    by Gitsnik
    Replies
    3
    Views
    1,442

    Re: SQLi - MySQL

    Which app? Might be easier if we can see the block of code causing you grief
  5. Discussioni: Reaver question

    by Gitsnik
    Replies
    11
    Views
    6,452

    Re: Reaver question

    Issue... I think 84 on the reaver googlecode page describes almost exactly this. Go through the same diagnostic steps as there. Specifically, use the --pin switch with the valid pin to be sure that...
  6. Discussioni: Backtrack on a Mac?

    by Gitsnik
    Replies
    5
    Views
    4,996

    Re: Backtrack on a Mac?

    It's possible if you treat it the same as bootcamp, but as a few of us Mac users will point out, it's almost not worth the effort. Get yourself a USB wifi dongle if you need one, and run Backtrack...
  7. Discussioni: nmap xml file grep

    by Gitsnik
    Replies
    2
    Views
    1,755

    Re: nmap xml file grep

    If daedalus' suggestion doesn't do it for you, grep/awk/sed are going to make it rough, at the guess
    grep -iE '(portid|product|version)'Will pull out the appropriate lines. Something like...
  8. Discussioni: Is this forum dying?

    by Gitsnik
    Replies
    46
    Views
    7,323

    Re: Is this forum dying?

    It's not really that they're noobs that's the problem. There are a number of people on these forums and others that get help directly from so called "senior members". The problem is a lack of...
  9. Discussioni: Is this forum dying?

    by Gitsnik
    Replies
    46
    Views
    7,323

    Re: Is this forum dying?

    They have one. You need to actually pass the exams/ pay to get into the forums. This is the public site, where all the newbies are. An auto-ban of "new to linux" phrases might not be bad, but it's...
  10. Discussioni: Stealing SUDO Privs

    by Gitsnik
    Replies
    0
    Views
    1,452

    Stealing SUDO Privs

    Some of you may remember we were talking about stealing sudo privs from logged in users some time ago. I'd noticed behaviour on an older Red Hat distro which granted sudo to a user even if it wasn't...
  11. Replies
    14
    Views
    2,875

    Re: Admin disabled private message

    Wait is this the Hackpack which is behind a registration wall and basically undownloadable anywhere else? What's so secret about it that you can't let someone download it and read through it without...
  12. Replies
    18
    Views
    3,363

    Re: Removing patterns from Numeric wordlist

    Haha no probs, hit TAPE up if you run in to any issues, he can contact me if he needs the extra and looks like you two could come up with the answers properly anyway. Look forward to seeing it.
    ...
  13. Replies
    18
    Views
    3,363

    Re: Removing patterns from Numeric wordlist

    It'll take a fair whack of processing power to check everything but at least you can clean it up along the way thad0ctor - nested if/ loop checks would be most appropriate I should think:

    crunch |...
  14. Replies
    18
    Views
    3,363

    Re: Removing patterns from Numeric wordlist

    Alright then here is a script that will remove duplicated letters. It's not going to remove all patterns, I'm not giving you anything in the area's of artificial networks, but you can figure out the...
  15. Replies
    3
    Views
    1,072

    Re: raw sockets, not getting reply

    You need those fields they will be corrupting the packet entirely without them.

    My BSD server has LibNET installed on it: /usr/local/share/examples/libnet11/synflood.c looks interesting AND using...
  16. Replies
    3
    Views
    1,072

    Re: raw sockets, not getting reply

    Whilst I hope that it's obvious, 43 alpha is for UDP datagrams - a different layer header and the like. But skipping ahead a task should net you what you're after.

    All that aside, a good...
  17. Replies
    7
    Views
    4,369

    Re: The nature of Backtracks virus infection?

    Don't do that. Your anti virus is there to protect the stupid, not your pentesting machine. Odds are it's saying things like "exploit/z-bba". Which is odd, considering you're scanning an exploit...
  18. Replies
    5
    Views
    1,609

    Re: Anyone have a lab with with virtual firewall?

    You start to attack it the same way you would attack anything "from the internet". If your backtrack box is inside the network, then you don't attack it that way, you attack as though you are in the...
  19. Replies
    5
    Views
    1,609

    Re: Anyone have a lab with with virtual firewall?

    Yeah it's not hard really. Easiest for you if you use the virtual lan options - set up (3) vm's. First is your firewall and it has 2 NIC's - 1 goes to the internet/nat/directlan/whatever, the other...
  20. Replies
    3
    Views
    939

    Re: Creating_A_Vulnerable_Webapp

    Looks more like your problem is in the initial set up and has not all that much to do with what you enter into the password field.

    Try harder.
  21. Replies
    3
    Views
    939

    Re: Creating_A_Vulnerable_Webapp

    You have a password problem. It's the first line of the dialogue.
  22. Replies
    34
    Views
    24,448

    Re: What can someone do after discovering a "exploit"?

    The question of disclosure is definitely one for about 600 pages of ethics philosophers, everyone will have their own opinion on the topic. On the side of non-disclosure:

    Recently I contacted the...
  23. Re: Trying to figure out a program to write. . . . Facebook sniffer?

    Left field, something I've been working on lately. Purely for hypothetical purposes of course :rolleyes:.

    Fake emails into a mailbox.

    So that you could say:

    On the 23rd of August 2003 I...
  24. Re: Offline algorithm to turn an IP4 address into a country name

    Just around the statements on line 22 and 30.

    I usually cheat (though it's been a while):
    try {
    blah
    } catch exception (e) {
    meh
    }Saves having to argue with IOExceptions and all the rest....
  25. Re: Offline algorithm to turn an IP4 address into a country name

    Sorry Virchanza I only just saw this. I am the first to admit this isn't running from my BT system, but it might make things easier for you
    # geoiplookup 173.245.60.120 | awk -F:\ '{print $2}' |...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4